• 4 minutes Oil Price Editorial: Beware Of Saudi Oil Tanker Sabotage Stories
  • 6 minutes UAE says four vessels subjected to 'sabotage' near Fujairah port
  • 9 minutes Why is Strait of Hormuz the World's Most Important Oil Artery
  • 13 minutes Mueller Report Brings Into Focus Obama's Attempted Coup Against Trump
  • 5 hours Australian Voters Reject 'Climate Change' Politicians
  • 4 hours Global Warming Making The Rich Richer
  • 22 mins The Consequences: Full-Blown Trade War Will Push World Towards Recession
  • 3 hours Greenpeace Blocks BP HQ
  • 5 hours Shale to be profitable in 2019!!!
  • 1 min IMO2020 To scrub or not to scrub
  • 12 hours Australia Election Summary: "This was the Climate Change Cult Election, and the Climate Change Cult Lost"
  • 1 hour Did Saudi Arabia pull a "Jussie Smollett" and fake an attack on themselves to justify indiscriminate bombing on Yemen city population ?
  • 6 hours Shell ‘to have commercial wind farms’ by early 2020s
  • 16 hours Canada's Uncivil Oil War : 78% of Voters Cite *Energy* as the Top Issue
  • 16 hours Some Good News on Climate Change Maybe
  • 12 hours DUG Rockies: Plenty Of Promise, Despite The Politics
  • 12 hours Misunderstanding between USA and Iran the cause of current stand off, I call BS
  • 4 hours California Threatens Ban on ICE Cars
  • 1 hour 6 Ways to Fight Climate Change

U.S. Urges Energy Companies To Be On Guard Against Russian Cyberattacks

The U.S. Department of Homeland Security (DHS) is urging operators of the country’s critical infrastructure to check their computers carefully against the possibility they’ve been infected with malicious software from a group of hackers who are believed to be Russian.

The group is known to private malware researchers as “Energetic Bear” because it operates during Russian working hours and mostly targets Western energy companies. The U.S. security firm Symaec and F-Secure of Finland report that the group was responsible for an effort to implant the Havex Trojan infect in their victims’ computers.

On July 1, DHS’s Industrial Control Systems Cyber Emergency Response Team, or ISC-CERT, encouraged the companies to ensure that they already hadn’t been infected and offered specific steps on preventing such attacks.

According to a Symantec report on June 30, Havex is what is known as a “remote access Trojan,” or RAT, malware that secretly enters a computer to give hackers control of the machine. Symantec and F-Secure say the malware ordinarily is used only for spying, but can be modified to sabotage a machine.

In fact, Keven Haley, the director of security response at Symantec, told The New York Times that there’s no evidence that Energetic Bear is bent on eventual sabotage, but merely want to get a better understanding of how the victim companies operate. Still, he cautioned, “[T]he potential for sabotage is there.”

Symantec, F-Secure and DHS have not identified the victims of the attacks except to say they’re in the energy and other industrial fields. They said the attacks have hit at least 1,018 companies in 84 countries, though some infections could be accidental. Most of the infections were in Spain, followed by the United States, France, Italy and Germany.

Related Article: You Won't Believe How Off-Target Grid Security Really Is

The attacks consist of flooding victims with e-mails carrying malicious attachments or hyperlinks. But Energetic Bear also targets websites that are likely to be visited by the companies’ employees. In such “watering hole attacks,” as they are known, the hackers infect a website frequented by the employees, such as the online menu of a nearby restaurant, which then infects the employee’s computer.

A frightening aspect of the Energetic Bear attacks is that they do more than tamper with a computer’s software, which can be fixed relatively easily. Symantec says these hackers often go to the machine’s physical core called the BIOS, or “basic input/output system,” which ultimately renders the computer unusable.

The Energetic Bear attacks resemble Operation Olympic Games, a series of reported attacks by the United States and Israel against Iran. The campaign used the Stuxnet virus in July 2010 to sabotage Iran’s uranium enrichment plants in what Symangec calls “the first known major malware campaign to target [industrial control] systems.”

By Andy Tully of Oilprice.com



Join the discussion | Back to homepage

Leave a comment

Leave a comment

Oilprice - The No. 1 Source for Oil & Energy News